A network architect is designing a remote access solution for mobile workers with laptop computers and will use GPRS technology for over-the-air communications. Because workers access sensitive information, what protection is required to protect GPRS traffic?

a. GPRS’s over-the-air encryption is sufficient and no VPN is needed.
b. GPRS’s over-the-air encryption has been compromised and a VPN is needed.
c. GPRS has no over-the-air encryption and a VPN is needed.
d. GPRS is not suitable for Internet communications and should not be used.


a. GPRS’s over-the-air encryption is sufficient and no VPN is needed.

Computer Science & Information Technology

You might also like to view...

__________ is not a desirable characteristic of a successful migration strategy.

a) Transparency b) Scalability c) Residual dependency d) Fault tolerance

Computer Science & Information Technology

Which of the following is NOT true in relation to digital rights management (DRM)?

A) It imposes restrictions on the use of files. B) It can be found on files such as music, eBooks, and videos. C) It is a technology applied to digital media files. D) It can legally be removed from a file.

Computer Science & Information Technology

What is the physical rate of transmission of a T1 leased line?

A) 10 Mbps B) 100 Mbps C) 44.455 Mbps D) 1.544 Mbps E) 2 Mbps F) 5.455 Mbps

Computer Science & Information Technology

Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)

A) MP3 player B) Laptop computer C) Palm III PDA D) Cell phone

Computer Science & Information Technology